“It is vital that CIOs/ CISOs are familiar of the landscape when they work with companies based out of EU and are processing the personal information of their data subjects” Jaspreet Singh, Partner- Information Security, EY said.

The US government would seek to wrestle hundreds of thousands of infected routers and storage devices from the control of hackers who security researchers warned were planning to use the "botnet" to attack Ukraine.

GDPR which comes into effect from May 25, will bring in strict data privacy laws that aim to strengthen and protect the data of individuals within the EU and also deals with export of personal data outside the region.

In an interview with ETCISO, Jeremy King, International Director, PCI security standards council, shares his expertise on how Indian e-wallet companies can improve data security and evolve from traditional encryption technologies like SSLM & TLS towards cryptography.

During the 2016 campaign, hackers stole emails from the personal account of Democratic candidate Hillary Clinton's campaign chairman and from the Democratic National Committee, and they were used to embarrass Clinton.

A host of digitalization programs, linking of Aadhaar, linking of critical infrastructures and demonetisation has made the country cyber-vulnerable, said Joris den Bruinen, deputy director of 'The Hague Security Delta'.

This Website Uses Cookies

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you've provided to them or that they've collected from your use of their services. Give your consent to our cookies for: